• 0 Posts
  • 15 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle
  • Now you have to trust the software used to do this, the algorithm itself, and that there was no tampering before the data got stored. Which is something truly verifiable by a very tiny subset of population and even then with full cooperation from authorities. This is the opaqueness of countermeasures.

    Vote counting is not a mathematical problem, but a sociological one. Any „always correct machine” is useless if people can’t reasonably trust it.

    Paper ballots don’t scale - you can’t stuff ballots without someone being present - and are designed exactly in the problem space vote counting itself occupies. As an additional evidence in their favor, autocratic regimes and corrupt politicians are way too eager to switch to electronic voting.













  • Slotos@feddit.nltoLinux@lemmy.mlssh reverse tunnel
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    3 months ago
    • ssh to remote, forwarding some remote port to your local ssh port (-R)
    • ssh from remote through the exposed port, starting socks proxy in the process (-D)
    • use socks proxy explicitly or find some tool that can route the traffic into it

    Similar approach can be used to establish VPN tunnel with no encryption (ssh already provides that), routing everything but your ssh connection through it.

    • ssh to remote, reverse forwarding your VPN-over-tcp server’s listening port
    • establish vpn connection on remote, route everything but your ssh connection through the newly established interface

    It will be wasteful, but it will work.